Fiverr (gig work/task platform, competitor to Upwork) uses a service called Cloudinary to process PDF/images in messaging, including work products from the worker to client.

Besides the PDF processing value add, Cloudinary effectively acts like S3 here, serving assets directly to the web client. Like S3, it has support for signed/expiring URLs. However, Fiverr opted to use public URLs, not signed ones, for sensitive client-worker communication.

Moreover, it seems like they may be serving public HTML somewhere that links to these files. As a result, hundreds are in Google search results, many containing PII.

Example query: site:fiverr-res.cloudinary.com form 1040

In fact, Fiverr actively buys Google Ads for keywords like "form 1234 filing" despite knowing that it does not adequately secure the resulting work product, causing the preparer to violate the GLBA/FTC Safeguards Rule.

Responsible Disclosure Note -- 40 days have passed since this was notified to the designated vulnerability email (security@fiverr.com). The security team did not reply. Therefore, this is being made public as it doesn't seem eligible for CVE/CERT processing as it is not really a code vulnerability, and I don't know anyone else who would care about it.

HeliumHydride1 hour ago | | | parent | | on: 47769796
It seems that someone sent a DMCA complaint months ago relating to this: https://lumendatabase.org/notices/53130362
applfanboysbgon1 hour ago | | | parent | | on: 47769796
Software development jobs are too accessible. Jobs with access to/control over millions of people's data should require some kind of genuine software engineering certification, and there should be business-cratering fines for something as egregious as completely ignoring security reports. It is ridiculous how we've completely normalised leaks like this on a weekly or almost-daily basis.
morpheuskafka1 hour ago | | | parent | | on: 47772240
They may be part of it, but as a publicly traded company, there's got to be a at least a few people there with a fancy pedigree (not that that actually means they are good at their job or care). But if such a test existed, they presumably would have passed it.

They also have an ISO 27001 certificate (they try to claim a bunch of AWSs certs by proxy on their security page, which is ironic as they say AWS stores most of their data while apparently all uploads are on this).

Loughla52 minutes ago | | | parent | | on: 47772240
Teachers have to be licensed and keep up on licensing.

Plumbers. Electricians. Lawyers. Doctors. Hell, I have to get a license to run my own business.

Why shouldn't software come with a branch for licenses if you're working with sensitive data?

coldtea42 seconds ago | | | parent | | on: 47772565
We're going the other way: now any random vibe coded slop is the norm.
fnimick55 minutes ago | | | parent | | on: 47772240
At least I'm sure LLM tools deploying code to production won't result in this happening more frequently. "Make sure it's secure. Make no mistakes."
qingcharles1 hour ago | | | parent | | on: 47769796
That's wild. Thousands of SSNs in there. Also a lot of Fiverr folks selling digital products and all their PDF courses are being returned for free in the search results.
mtmail4 hours ago | | | parent | | on: 47769796
You followed the correct reporting instructions.

https://www.fiverr.com/.well-known/security.txt only has "Contact: security@fiverr.com" and in their help pages they say "Fiverr operates a Bug Bounty program in collaboration with BugCrowd. If you discover a vulnerability, please reach out to security@fiverr.com to receive information about how to participate in our program."

janoelze1 hour ago | | | parent | | on: 47769796
really bad stuff in the results. very easy to find API tokens, penetration test reports, confidental PDFs, internal APIs. Fiverr needs to immediately block all static asset access until this is resolved. business continuity should not be a concern here.
mpeg1 hour ago | | | parent | | on: 47772068
lots of admin credentials too, which have probably never been changed
janoelze1 hour ago | | | parent | | on: 47772082
admin passwords to dating sites, that's the stuff people get blackmailed with
qq661 hour ago | | | parent | | on: 47772158
How does someone's dating site password end up in Fiverr?
janoelze1 hour ago | | | parent | | on: 47772351
it's worse than you think – it's an admin password to the ~whole site~
wxw4 hours ago | | | parent | | on: 47769796
Wow, surprised this isn't blowing up more. Leaking form 1040s is egregious, let alone getting them indexed by Google...
johnmlussier2 hours ago | | | parent | | on: 47769796
Probably not in scope but maybe https://bugcrowd.com/engagements/cloudinary will care?

This is bad.

morpheuskafka2 hours ago | | | parent | | on: 47771893
They probably wouldn't act immediately as there's no way for them to enable signing without breaking their client's site. The only cleanup you could do without that would be having google pull that subdomain I guess?

(Fiverr itself uses Bugcrowd but is private, having to first email their SOC as I did.)

impish92082 hours ago | | | parent | | on: 47769796
This is crazy! So many tax and other financial forms out in the open. But the most interesting file I’ve seen so far seems to be a book draft titled “HOOD NIGGA AFFIRMATIONS: A Collection of Affirming Anecdotes for Hood Niggas Everywhere”. I made it to page 27 out of 63.
yieldcrv1 hour ago | | | parent | | on: 47771760
I found someone's manuscript, at first I thought it would be scandalous to find it ghost written, but it actually is just annotations and someone proof reading it, the annotations come up in the PDF

I found the author on Amazon and the book still hasn't been released

this is sad

onraglanroad2 hours ago | | | parent | | on: 47771760
I've read worse. Better than Dan Brown!
b00ty4breakfast1 hour ago | | | parent | | on: 47771836
that bar is subterranean, haha
sergiotapia1 hour ago | | | parent | | on: 47771760
Link please :pray:
yapfrog1 hour ago | | | parent | | on: 47772320
https://fiverr-res.cloudinary.com/image/upload/f_pdf,q_auto/...

I will say that the title is the best part

mraza0073 hours ago | | | parent | | on: 47769796
Woah that's brutal all the important information is wild in public
sergiotapia1 hour ago | | | parent | | on: 47769796
This is really bad, just straight up people's income, SSN and worse just right there in the search results on Brave Search even.
smashah2 hours ago | | | parent | | on: 47769796
They bought and.co and then dropped it. strange company
yieldcrv1 hour ago | | | parent | | on: 47769796
this is a bad leak, appreciate the attempts at disclosure before this
popalchemist2 hours ago | | | parent | | on: 47769796
Burn it to the ground.
BoredPositron2 hours ago | | | parent | | on: 47769796
Just by scrolling over it that's really rough.
iwontberude2 hours ago | | | parent | | on: 47769796
Loooool what a mess
xtracto3 minutes ago | | | parent | | on: 47771663
I just looked at the google search results... Holly cow... it is bad bad bad
walletdrainer1 hour ago | | | parent | | on: 47769796
> Moreover, it seems like they may be serving public HTML somewhere that links to these files. As a result, hundreds are in Google search results, many containing PII

This is not how Google works.

AndroTux1 hour ago | | | parent | | on: 47772157
It kind of is, though. Google doesn't randomly try to visit every URL on the internet. It follows links. Therefore, for these files to be indexed by Google, they need to be linked to from somewhere.
xtracto2 minutes ago | | | parent | | on: 47772318
Exactly , that's whyb"non public" github gists work. They are public, but not indexed anywhere "by default "